This week’s Economist has a short article on mobile device security. Rightfully so, they recognize the security threat is data loss as opposed to malware. As discussed in previous posts, the BYOD challenge is about management of devices. Data loss prevention is most effective when it is aware the device exists and is accessing, sitting or transmitting certain information when it should not be.
We have been asked recently about the potential growth in the BYOD space. It won’t come from malware. It will come from a proliferation of devices, from the common smartphone to the latest wearable, that is retaining and transmitting information the enterprise simply does not want transmitted. And please remember, data is not just spreadsheet attachments in an email, more importantly it is video, taken innocently or not in the office, that poses data loss problems.
That is the threat of BYOD.
Regular followers of this blog know that BYOD (Bring Your Own Device) is a hot button issue of mine. In recent posts, I’ve explored some of the challenges faced by the never-ending flood of personal devices in the workplace – security, compliance and management key among them. But hopefully, I’ve also conveyed an enthusiasm for all BYOD has to offer. More than a powerful enabler of productivity, it also helps employees be more responsive to customers. When you think of it, this is every company’s goal.
There are many strong opinions about BYOD, and I can take up more than a few blogs on the topic. But the truth is – whether you love it or hate it – BYOD is here to stay and companies must be prepared to handle all it brings.
As a first step, companies must devise a strategy that specifically addresses security, compliance, and management. It’s more than securing the individual device – but ensuring the actual network stays safe. Going beyond security is addressing such things as mobile application management, or how enterprises ensure access to apps that improve employee productivity. It’s also about application enablement – determining which apps to include in the mobile device toolkit — and then limiting those that pose a threat. The biggest challenge is delivering all this functionality under one umbrella – in a cohesive package.
That’s why I’m so pleased to introduce BYODShield.
Today, Westcon announced our teaming with BlueCat and Fiberlink to provide an industry first – a subscription-based service delivering a multi-layered “shield” that specifically addresses security, compliance, and management issues created by personal devices in the workplace. We’re tightly integrating formerly disparate network security and enterprise mobility offerings — packaging them alongside our deep GOLDShield technology pre- and post-sales support model – and creating an all-in-one solution. It’s a service that virtually eliminates current and future headaches associated with provisioning, servicing, securing, and managing thousands of personal devices.
But it’s much more than a simple partnership. Really, any distributor can do that. We’ve successfully brought together BlueCat and Fiberlink to jointly write code exclusively for Westcon. The functionality delivered by this deep collaboration can’t be found anywhere else. We’re really proud of the result – integrating award-winning technology with our unsurpassed expertise in security and unified communications.
When it comes down to it, BYODShield is about demystifying the complexities of managing and securing personal devices in the workplace. Instead of trying to contain BYOD, we help you embrace it. And it’s something you’ll see us do even more down the road. Because the real future of distribution comes through offering resellers a consistent, unified, and integrated approach to solve their most complex technology challenges. And a good distributor will tackle the integration and do the legwork for you – backing it with all services necessary to make it work.
Like anything new, BYOD is a scary proposition that can cause nightmares for any CIO… But before losing any sleep, take a step back and see what’s possible when leveraging the right tools. And be sure to check out more about BYODShield at http://us.westcon.com/byodshield
Posted in BYOD, BYODShield, Cloud Computing, IPAM, MAM, MDM, Mobility, Security, Uncategorized
Tagged BYOD, BYODShield, IPAM, MAM, MDM